Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Citrix redirection bug


Vulnerability Assessment Details

Citrix redirection bug

Vulnerability Assessment Summary
Citrix Redirection detection

Detailed Explanation for this Vulnerability Assessment

The remote Citrix NFuse Webserver is vulnerable to a bug wherein any
anonymous user can force the server to redirect to any arbitrary
IP and Port. Among other things, this flaw can permit an external
attacker to use the Citrix server as a rudimentary port scanner of
either another network or the internal network of which the Citrix
server is a part of.

Solution : Place your Citrix server behind a reverse proxy or
authenticating firewall.

Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Tenable Network Security

Cables, Connectors

INTEL XEON CPU REPLACEMENT X6550 8 CORE 8C FOR IBM BLADECENTER HX5 46M6993
$2299.0
INTEL XEON CPU REPLACEMENT X6550 8 CORE 8C FOR IBM BLADECENTER HX5 46M6993 pictureMatched Pair of Intel Xeon E5-2670 SR0KX 2.60GHz 20MB 8-Core 8.0GT/s LGA2011 CPU
$98.99
Matched Pair of Intel Xeon E5-2670 SR0KX 2.60GHz 20MB 8-Core 8.0GT/s LGA2011 CPU pictureINTEL XEON CPU KIT E5-2650L 8 CORE 8C 1.8GHZ FOR DELL POWEREDGE C8220 E5-2650L
$1305.0
INTEL XEON CPU KIT E5-2650L 8 CORE 8C 1.8GHZ FOR DELL POWEREDGE C8220 E5-2650L pictureHP CPU INTEL XEON 8 CORE PROCESSOR E5-2667V3 3.2GHZ FOR HP Z640 Z840 790100-001
$1595.0
HP CPU INTEL XEON 8 CORE PROCESSOR E5-2667V3 3.2GHZ FOR HP Z640 Z840 790100-001 picture


Discussions

No Discussions have been posted on this vulnerability.